CVE-2022-25194

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in Jenkins autonomiq Plugin allows attackers to trick authenticated users into unknowingly connecting Jenkins to attacker-controlled servers with attacker-specified credentials. This affects all Jenkins instances running autonomiq Plugin version 1.15 or earlier. The vulnerability enables attackers to potentially intercept sensitive data or manipulate Jenkins operations.

💻 Affected Systems

Products:
  • Jenkins autonomiq Plugin
Versions: 1.15 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the autonomiq plugin to be installed and configured in Jenkins. The vulnerability exists in the plugin's web interface forms.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could redirect Jenkins to malicious servers, intercepting sensitive build data, credentials, and artifacts, potentially leading to data theft, supply chain compromise, or unauthorized code execution.

🟠

Likely Case

Attackers could redirect Jenkins to capture sensitive information from builds or manipulate build processes to inject malicious code into software artifacts.

🟢

If Mitigated

With proper CSRF protections and network segmentation, impact is limited to potential data exposure from the autonomiq plugin's specific functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated Jenkins user with appropriate permissions to visit a malicious webpage while logged into Jenkins.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.16

Vendor Advisory: https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2545

Restart Required: Yes

Instructions:

1. Update Jenkins autonomiq Plugin to version 1.16 or later via Jenkins Plugin Manager. 2. Restart Jenkins after plugin update. 3. Verify plugin version in Manage Jenkins > Manage Plugins > Installed tab.

🔧 Temporary Workarounds

Disable autonomiq Plugin

all

Temporarily disable the vulnerable plugin if immediate patching is not possible.

Navigate to Manage Jenkins > Manage Plugins > Installed tab, find autonomiq Plugin, click Disable

Enable CSRF Protection

all

Ensure Jenkins global CSRF protection is enabled (though plugin-specific vulnerability may still exist).

Navigate to Manage Jenkins > Configure Global Security, ensure 'Prevent Cross Site Request Forgery exploits' is checked

🧯 If You Can't Patch

  • Implement strict network controls to limit Jenkins server outbound connections to only trusted destinations.
  • Use browser extensions or configurations that block third-party cookies and implement additional CSRF token validation.

🔍 How to Verify

Check if Vulnerable:

Check Jenkins Plugin Manager for autonomiq Plugin version. If version is 1.15 or earlier, the system is vulnerable.

Check Version:

curl -s http://jenkins-host/pluginManager/api/json?depth=1 | grep -o '"autonomiq":{"version":"[^"]*"'

Verify Fix Applied:

Verify autonomiq Plugin version is 1.16 or later in Manage Jenkins > Manage Plugins > Installed tab.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound connections from Jenkins to unfamiliar servers
  • Changes to autonomiq plugin configuration without corresponding admin activity

Network Indicators:

  • Jenkins server making unexpected outbound HTTP/HTTPS connections to unknown IPs/domains
  • Traffic patterns suggesting data exfiltration through autonomiq plugin

SIEM Query:

source="jenkins.log" AND ("autonomiq" AND ("configuration changed" OR "connection established"))

🔗 References

📤 Share & Export